Digital Identity Management: Technological, Business and Social Applications

Marlene Holmner (University of Pretoria)

Online Information Review

ISSN: 1468-4527

Article publication date: 25 September 2009

270

Keywords

Citation

Holmner, M. (2009), "Digital Identity Management: Technological, Business and Social Applications", Online Information Review, Vol. 33 No. 5, pp. 1008-1009. https://doi.org/10.1108/14684520911001972119860

Publisher

:

Emerald Group Publishing Limited

Copyright © 2009, Emerald Group Publishing Limited


In the information age our digital identity is a part of our overall identity, an identity that is translated in computer bits and bytes. This identity is created, stored, copied, manipulated and exchanged over computer networks and therefore needs to be managed effectively. Digital identity management is thus concerned with the administration and design of information that is used to positively identify specific users to thereby authorise them for digital transactions.

As indicated by the subtitle, digital identity management has implications for many sectors in society as well as possible future implications as digital identity evolves over time. The 22 chapters are organised according to key themes: Identity technologies, Identity in Business and Government, Digital Identity in Context, and future scenarios.

Section 1 provides an introduction to the concept of what digital identity management is, and explains the overall structure of the book. Section 2 contains six chapters that discuss key technologies that can be used to create digital identity management infrastructures as well as the implications of the use of these technologies, for example the implications of the use of smart cards.

The eight chapters of Section 3 focus on the use of the above‐mentioned technologies and infrastructures in both public and private sector organisations. Digital identity management is crucial for these organisations, as it would provide authorised access to the products and services that are needed by individuals, organisations and governments.

In Section 4 the six chapters bring together various contributions looking at digital identity management in a wider social policy context. As information sharing and identification has become central to governments around the world, issues pertaining to identity problems, identity fraud, current legislations and the protection afforded by these laws need to be addressed. The book concludes with a forward‐looking digital identity technology roadmap and discusses some of the future implications of these technologies.

All 22 chapters can be read as self‐contained units; however, the editor has done an excellent job in ensuring that all chapters conform to the same style. Most chapters are supplemented by figures and relevant case studies that clearly illustrate the author's main points.

Since digital identity management affects all people in society, this book caters for a very wide audience, ranging from private individuals to government policy‐makers. Readers of this book will find it an informative and interesting read, as it succeeds in raising awareness of the current and future implications surrounding digital identity management.

Related articles